Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1)a) Describe the significance of research.

b) Differentiate between research methods and research methodology.

problem 2)a) Briefly describe the research process with flow chart.

b) What are the criterions one must expects from scientific research?

problem 3)a) What is need of research design? Describe the features of a good design.

b) What are the techniques involved in defining a problem.

problem 4)a) Describe basic principles of experimental design.

b) Describe Latin square design method of formal experimental designs.

problem 5)a) Describe the process of data collection through problemnaires. Also prepare down merits and demerits of the same.

b) What are different complex random sampling designs? Describe any two.

problem 6)a) Describe the methods used for data collection in research methods.

b) Describe the difference between survey and experiment.

problem 7)a) What are the significant statistical measures being used for data analysis? Describe any one.

b) What are the measures of relationship? Describe Karl Pearson’s coefficient of correlation.

problem 8)a) How to find out sample size in data analysis? Describe the method of determining sample size based on precision rate and confidence level.

b) Describe in brief:

i) Index Numbers.

ii) Time series Analysis.

Describe 9)a) Describe the decision making technique of Analytical Hierarchy Process.

b) Describe TOPSIS method of decision making.

problem 10)a) describe in the following :

i) Neural network technique.

ii) Data Envelope Analysis (DEA).

b) Describe Graph theory approach in decision making.

problem 11) Describe the techniques of interpretation and precautions in interpretation.

problem 12) Describe the layout of research report and mechanics of report writing.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95710

Have any Question? 

Related Questions in Computer Engineering

Let m and c be random variables that take values from the

Let M and C be random variables that take values from the set of possible plaintexts and the set of possible ciphertexts for some cryptosystem. Prove that the cryptosystem provides perfect secrecy if and only if p(M | C) ...

Assume that we have an isolated as running rip we can say

Assume that we have an isolated AS running RIP. We can say that we have at least two different kinds of datagram traffic in this AS. The first kind carries the messages exchanged between hosts; the second carries message ...

Assignmentyou have been recently hired to assist with

Assignment You have been recently hired to assist with purchasing computer forensics tools and resources for a major corporation. Using the concepts that you learned in chapters nine through twelve recommend specific too ...

Welcome to the pen testing firm of bodgit and run we hope

Welcome to the Pen Testing firm of Bodgit and Run, we hope you will find your work with our company both entertaining (for you) and profitable (for us). To this end we have a client who wants us to do a risk assessment o ...

Classes such as rectangle2ddouble ellipse2ddouble and

Classes such as Rectangle2D.Double, Ellipse2D.Double and Line2D.Double implement the Shape interface. The Shape interface has a method that returns a rectangle completely enclosing the shape. Consider the method call: Ex ...

1 assume that you have 1 ss cpu how many cycles will it

1. Assume that you have 1 SS CPU. How many cycles will it take to execute these two threads? How many issue slots are wasted due to hazards? 2. Now assume you have 2 SS CPUs. How many cycles will it take to execute these ...

After being fired an employee becomes disgruntled the

After being fired, an employee becomes disgruntled. The managers never disabled his login information, and his best friend still works at the company. The disgruntled employee gives his friend his login information for t ...

Search the world wide web for job descriptions of project

Search the World Wide Web for job descriptions of project managers. You can use any number of Web sites, including or, to find at least ten IT-related job descriptions. What common elements d ...

1 given an unsorted list of n values what is the

1. Given an unsorted list of n values, what is the time-complexity to find the k t h smallest value in the worst case? What would be the complexity if the list were sorted? 2. What is the O(·) for the findSortedPosition( ...

1 using the implementation of the ipaddresses class

1. Using the implementation of the IPAddresses class developed in this chapter, write a method that displays the IP addresses stored in the class in ascending order. Use the method in a program. 2. Write a program that s ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen